UNIFICATION OF TECHNOLOGIES

Similar documents
Unlocking the Power of the Cloud

About NitroSecurity. Application Data Monitor. Log Mgmt Database Monitor SIEM IDS / IPS. NitroEDB

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Automating the Top 20 CIS Critical Security Controls

Total Security Management PCI DSS Compliance Guide

Reinvent Your 2013 Security Management Strategy

locuz.com SOC Services

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

How can OSSIM help you with your PCI DSS Wireless requirements?

Security Information & Event Management

Qualys Cloud Platform

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

MAXIMIZE SOFTWARE INVESTMENTS

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

CND Exam Blueprint v2.0

align security instill confidence

SecureVue. SecureVue

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

ALIENVAULT USM FOR AWS SOLUTION GUIDE

SYMANTEC DATA CENTER SECURITY

NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Tenable for Palo Alto Networks

Business Context: Key for Successful Risk Management

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

CyberPosture Intelligence for Your Hybrid Infrastructure

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

RSA pro VMware. David Matějů. RSA, The Security Division of EMC

in PCI Regulated Environments

Industrial Defender ASM. for Automation Systems Management

CompTIA Security+ Study Guide (SY0-501)

CipherCloud CASB+ Connector for ServiceNow

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

Device Discovery for Vulnerability Assessment: Automating the Handoff

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Security Configuration Assessment (SCA)

Datacenter Security: Protection Beyond OS LifeCycle

the SWIFT Customer Security

Building a Resilient Security Posture for Effective Breach Prevention

How AlienVault ICS SIEM Supports Compliance with CFATS

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

SIEMLESS THREAT MANAGEMENT

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

CyberArk Privileged Threat Analytics

Security Operations & Analytics Services

IBM services and technology solutions for supporting GDPR program

Aligning IT, Security and Risk Management Programs. Ahmed Qurram Baig, CISSP, CBCP, CRISC, CISM Information Security & GRC Expert

Everything visible. Everything secure.

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Enterprise & Cloud Security

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Modern Database Architectures Demand Modern Data Security Measures

Security Diagnostics for IAM

Demystifying Governance, Risk, and Compliance (GRC) with 4 Simple Use Cases. Gen Fields Senior Solution Consultant, Federal Government ServiceNow

Version 5.3 Rev A Student Guide

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

CAN MICROSOFT HELP MEET THE GDPR

GDPR: An Opportunity to Transform Your Security Operations

The CIS Critical Security Controls are a relatively small number of prioritized, well-vetted, and supported security actions that organizations can

IBM Internet Security Systems Proventia Management SiteProtector

ISACA Arizona May 2016 Chapter Meeting

Qualys Cloud Platform

ALERT LOGIC LOG MANAGER & LOG REVIEW

Investor presentation

IPsec VPN. Quick Guide 3/19/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Best Practices & Lesson Learned from 100+ ITGRC Implementations

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

TRIPWIRE VIA PLATFORM PROTECTING YOUR DATA WITH INTEGRATED SECURITY CONTROLS

Cybersecurity Roadmap: Global Healthcare Security Architecture

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

MITIGATE CYBER ATTACK RISK

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Competitive Matrix - IRONSCALES vs Alternatives

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

IBM Proventia Management SiteProtector Sample Reports

You Can See Everything From Our Windows

Top 10 use cases of HP ArcSight Logger

AT&T Endpoint Security

Designing and Building a Cybersecurity Program

Speed Up Incident Response with Actionable Forensic Analytics

Creating Near Real-Time and End-to-End Cyber Situational Awareness of University Networks

Real-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

Cyber Security Audit & Roadmap Business Process and

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Managing Microsoft 365 Identity and Access

SIEMLESS THREAT DETECTION FOR AWS

The Business Case for Network Segmentation

AirMagnet Enterprise DATASHEET

PROTECTING INFORMATION ASSETS NETWORK SECURITY

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO

Transcription:

UNIFICATION OF TECHNOLOGIES SIEM Management Incident Management Risk Intelligence Storage Detection Prevention Awareness Security Technology IDS/IPS WIDS Vulnerability Assessment Identity Unified SIEM Inventory HIDS File Integrity Threat Assessment Resources

HOW IT WORKS: 3 INTERACTIVE COMPONENTS Monitoring & Management Intelligent Correlation Security Dashboard 1.SIEM 2. Logger Security Information Transaction Data 3. Sensor

WHY UNIFIED SIEM? Intelligence Compliance Time Cost

1. INTELLIGENCE: Security intelligence comes from context information processing 1. Attacks & Logs 7. Ext. Reputation 2. Vulnerabilities & Threats 6. Applications & Data CONTEXT 3. Inventory 5. Network & Resources 4. Users PROCESSING

1. INTELLIGENCE: SIEM products have achieved great intelligence, but they are rarely fed with the information to use it Prioritization False Positive Cleaning Attack 30% 50% 100% Vulnerability / Threat Inventory 20% Effective Impact Analysis

2. COMPLIANCE: All security technologies required by Compliance Regulations PCI 12.9 respond immediately to breach SOX, ISO, PCI SIEM SOX 304 & PCI 10.5 Secure audit trails PCI 11.2 quarterly vulnerability scans Incident Management Risk Intelligence Storage FISMA, HIPAA, ISO 12.6: periodic security testing PCI 11.4 requires NIDS/ IPS deployment Detection Prevention Awareness PCI 1.1.5, PCI WG, ISO 7.1.1 require asset inventoty PCI 11.1: WIDS and Rogue AP detection IDS/IPS WIDS Vulnerability Assessment Identity Inventory HIDS File Integrity Threat Assessment Resources PCI 11.4 requires HIDS PCI 11.5 File integrity PCI 6.2 identify new threats ISO 10.10 requires monitoring system resources

2. TIME: Effective Security Posture and Analysis delivered in 300 seconds Attacks Inventory Threats second 1 second 100 second 300

3. COST: Experience dramatic reduction 1. Unified Licenses & Hardware 2. Integration Services Up to 90% Cost Reduction 3. Maintenance & Support

COMPETITIVE POSITIONING Why CloudAccess Matters (Differentiation) Unified SIEM vs. Pure SIEM The sensor advantage Low Barrier to entry Hybrid Architecture

WHY CLOUD ACCESS MATTERS 24/7 monitoring on request Multi-tenant OPEX or CAPEX Supported Unique Pattern Recognition Engine (REACT) Integrated suite of products including SIEM/Log, IAM and REACT Lower Cost Go-To-Market strategy immediate Leading and Unique Technologies EASY TO USE!!!

CLOUD ACCESS VERSUS PURE SIEM SIEM Management Incident Management Risk Intelligence Storage Detection Prevention Awareness Security Context IDS/IPS WIDS Vulnerability Assessment Identity Inventory HIDS File Integrity Threat Assessment Resources

THE SENSOR ADVANTAGE Fast: Customer Security Posture from the first second Stealthy: Will not break the customer s network Complete: Provide all security services in a single box Out-of-the-box full Security Visibility

LOW BARRIER TO ENTRY: With elastic scaling in performance and complexity SaaS Web Services Elastic Performance Scaling Multi-tier hybrid architecture Cloud Customer Premises

HYBRID ARCHITECTURE: Function Deploy Lev Cloud 1 Analysis Cloud 2 Storage Cloud CP 3 Vulnerability Mgmt A. External B. Internal Cloud CP 4 Detection & Awareness CP Customer Premises

CLOUD ACCESS FLEXIBLE ARCHITECTURE: Customer1 has no on-site gear, sends logs to CloudAccess Collection Customer2 is using Managed IDS service, CloudAccess Sensor on Customer Premise Detection & Awareness Customer3 is using Local Vulnerability Scanning, CloudAccess Sensor on Customer Premise Tiered 2 nd Level Local Vulnerability Scan Customer4 has complete CloudAccess solution on premise, Managed by CloudAccess

INTRODUCING CloudAccess Unified SIEM Version 4

UNIFIED SITUATIONAL AWARENESS: AUTO DISCOVERY Function Technology Identity Monitoring Active Directory LDAP Authentication logs Network Auto-Discovery Topology Map Inventory Profiling Recurrent snmp scans Passive fingerprinting Active fingerprinting Host agent WMI Time-Service-Usage profiling Resource Monitoring Network Monitoring Network Availability Host Resources Anomaly detection Flows Snmp Snmp Any resource

OUT-OF THE-BOX PCI WIRELESS COMPLIANCE PCI Requirement Solution 11.1 Deploy a WIDS/WIPS CloudAccess Sensor includes a WIDS/WIPS WG WG Maintain an up-to-date wireless hardware inventory Detect Rogue AP and unauthorized wireless connections Automatically done by Situational Awareness Correlate information between WIDS and Inventory 4.1.1 Ensure strong cryptography.. WEP is prohibited Monitored by WIDS default

OTHER FEATURES & ENHANCEMENTS Enhancements in all areas of function: Policy Management Visualization Compliance Reporting Detection/analytics Integration Incident Response Host Security Vulnerability Assessment Asset Management Network Monitoring User Management Network Discovery Dashboards Usability Performance

UNIFED MANAGEMENT 1 unique Login 1 unique Asset Structure 1 unique User Structure

SEIM: A SINGLE PANE OF GLASS

LOG MANAGEMENT

UNIFIED VULNERABILITY SCANNER

NETWORK IDS

HOST IDS

UNIFIED SITUATIONAL AWARENESS

UNIFIED REPORTING

SUMMARY CloudAccess Unified SIEM 4.0 changes the game for SIEM customers. CloudAccess Unified SIEM 4.0 is a unique offering in the market Compliance, Time and Cost advantages makes CloudAccess Unified SIEM 4.0 the most competitive solution CloudAccess enables broad enterprise adoption

Thank You www.cloudaccess.com 877 550 2568 info@cloudaccess.com